[prev in list] [next in list] [prev in thread] [next in thread] 

List:       isn
Subject:    Re: [ISN] Hackers Copy Mannesmann Mobile Phone Sim Card
From:       mea culpa <jericho () dimensional ! com>
Date:       1998-04-28 1:00:22
[Download RAW message or body]


From: Felix von Leitner <leitner@math.fu-berlin.de>
Date: Tue, 28 Apr 1998 01:36:21 +0200
Subject: Re: [ISN] Hackers Copy Mannesmann Mobile Phone Sim Card

> In order to clone a SIM card, the hackers had to have both a copy of the
> original SIM card for at least 11 hours and know the PIN number. 
> Scientists at the University of California and the Smartcard Developers
> Association in the USA already reported weaknesses in smaller mobile
> telecoms networks at the beginning of April which work on the same GSM
> standard as the German networks D1, D2 and E-Plus. 

This is of course bullshit.  If they used the same standard, they would
all be vulnerable.  As a member of the CCC I can clarify a little here.
D2 is the only German network using COMP128 right now, which is the GSM
reference encryption algorithm.  What we did is "simply" implement the
attack outlined by Ian Goldberg et al from Berkeley.  And we made the
necessary software available on www.ccc.de, and there are blueprints for
useful hardware.  The PIN is not an issue because evil mobile dealers
can sell cloned phones now.

Our GSM guy says that there are only three networks that are known not
to use COMP128 right now, and two of them are in Germany, obviously.

For those who speak German, there is a nice round-up on

  http://www.ccc.de/D2Pirat/index.html 

and you can download the software there, too.  There are pictures of the
equipment there, too, that look quite cool ;)

What we demonstrated was that you can get the pin from the "secure"
envelope without traces and that you can use the attack from Goldberg to
get the secret key from the card in about 11 hours without overclocking
the card or tricks like that.  The URL to Goldberg's method was already
posted on ISN I believe.  And we showed that the clone and the original
can check into the D2 GSM network at the same time, they just can't
place calls simultaneously without error messages.  This all is of
course still very useful to criminals who need anonymous phones.

BTW: D2 put out some of the typical press blah like "no real damage",
"only theoretical attack", "same problem as when you lose your card",
stuff like that ;)

What remains to be seen is whether the other German mobile carriers use
better or just different algorithms.

Felix


-o-
Subscribe: mail majordomo@sekurity.org with "subscribe isn".
Today's ISN Sponsor: Dimensional Communications (www.dim.com)

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic